Cyber Security and Next Gen Systems Jay English Director Comm. Center & 9-1-1 Services APCO International 2013; all rights reserved
Topics to Cover NG9-1-1 Emerging technology and emerging threats Basic types of threats FirstNet and Security Planning and Preparation 2013; all rights reserved
NG9-1-1? Legacy 9-1-1 systems are relatively secure, and while threats exist they are somewhat limited TDoS Carrier outages Capacity issues While secure, the system is extremely dated and limited. Location limitations Media capabilities CAMA trunks / Circuit switched technology 2013; all rights reserved
NG9-1-1 Next Generation systems will be a network of networks providing connectivity between PSAPs on a network within a specified geographic area to other networks both regionally and nationally With advancement of technology comes an increased threat of infiltration and exploitation of the system Reliant on data rather than traditional voice NG9-1-1 systems and ESINets will be vulnerable to the same threats as existing IP networks and systems 2013; all rights reserved
Clients Access Networks Origination Networks Emergency Services IP Network (ESInet) Domains Government Services Legacy PSAP/Emergency Responders IM Clients LISs CSP Call Server Public Web Services DNS Legacy PSAP Gateway Multimedia Services NG9-1-1 (i3) PSAP SIP/H.323 clients Public Access IP Networks E-CSCF (IMS) Global Internet, Private Networks or IMS Location Validation Web Interface ECR Web Interfaces Originating Border Control ESInet Originating ESRP Terminating Border Control ESInet Terminating ESRP Wireless/IP Client Emergency Call Routing & Location Validation Databases Legacy Network Gateway Private Web Services Supplemental Services Databases NG9-1-1 (i3) PSAP PSTN client Legacy Circuit- Switched Networks Wireless/CS Client NOTE: Elements labeled in italic bold blue are in scope for this document. All others are shown for completeness only. 5
Types of Threats Destruction: Physical destruction of information or communications systems rendering them unusable Corruption: The changing of information such that it is no longer accurate or useful Removal: The removing of information so that it cannot be accessed, but is not destroyed Disclosure: Unauthorized release of confidential or sensitive information to the detriment of owner of said data Interruption: Interfering with communications such that legitimate users cannot send or receive messages 6
Cyber Security and FirstNet Secure communications are a core requirement for FirstNet Requirements include user credentialing, access control, authentication, auditing, confidentiality, data integrity, physical security, and applications High level network requirements include services, device management and identity management Services may be provided by a central authority and delivered through either centralized or distributed service mechanisms Included in the security specifications under consideration is the concept of a trusted zone and a trusted vulnerable zone 2013; all rights reserved
8 Trusted Zones
9
Planning and Preparation Have a pre-plan. The TDoS attacks resulted in activation of a task force to provide best practices and much needed cooperation amongst multiple parties. Those best practices can be found here: Learn about NG9-1-1. There are a number of resources available to provide education on NG9-1-1 and emerging technologies. Here are a couple of places to start: 10
Planning and Preparation Look into available security options for the networks all the way to the PSAP equipment level. Consider what your records systems will integrate with, your CAD and mobile requirements, recording and retention requirements, and integration of any outside network into your closed PSAP or jurisdictional systems. Research FirstNet and emerging Apps: FirstNet is exciting technology and will bring some tremendous capabilities to the public safety community. APCO encourages all members of the public safety community to begin researching, and understanding, the networks and systems that will make up FirstNet here: 11
Planning and Preparation Once you have a fundamental understanding of the concepts here, look into the Security and Priority sections of the FirstNet Statement of Requirements, found here: This research into security requirements provides you with a toolbox of information and questions as well as some design considerations for your own systems. 12
Planning and Preparation In addition to the actual FirstNet system, applications will play a key role in public safety. Today, apps are fun and convenient ways to send messages, retrieve information about a selected topic, or even find the closest place to eat when you re traveling. Tomorrow, they will provide life saving services and links to public safety in near realtime. Understanding the make up of emerging apps is critical to understanding how our networks of tomorrow will work. APCO has established a web site specifically designed to provide public safety professionals with a one stop source of information on public safety related apps. The site can be found here:. 13
Evolution not Revolution The security DNA of our networks will define our success 14